Conferences

Search results

    TitleConferenceSpeaker(s)
    Elephant in the Blameless War Room—AccountabilitySREcon21Christina Tan, Emily Arnott
    Take Me Down to the Paradise City Where the Metric Is Green and Traces Are PrettySREcon21Ricardo Ferreira
    Rethinking the SDLCSREcon21Emily Freeman
    Panel: Engineering OnboardingSREcon21Daria Barteneva, Jennifer Petoff, Anne Hamilton, Sandi Friend, Ilse White
    Panel: ObservabilitySREcon21Daria Barteneva, Liz Fong-Jones, Gabe Wishnie, Štěpán Davidovic, Richard Waid, Partha Kanuparthy
    A Political Scientist's View on Site ReliabilitySREcon21Michael Krax
    When Linux Memory Accounting Goes WrongSREcon21Minhaj Ahammed
    Capacity Management for Fun & ProfitSREcon21Aly Fulton
    Latency Distributions and Micro-Benchmarking to Identify and Characterize Kernel HotspotsSREcon21Danny Chen
    Sparking Joy for Engineers with ObservabilitySREcon21Zac Delagrange
    What To Do When SRE is Just a New Job Title?SREcon21Benjamin Bütikofer
    Let the Chaos Begin—SRE Chaos Engineering Meets CybersecuritySREcon21Francesco Sbaraglia, Adriana Petrich
    Spike Detection in Alert Correlation at LinkedInSREcon21Nishant Singh
    What's the Cost of a Millisecond?SREcon21Avishai Ish-Shalom
    10 Lessons Learned in 10 Years of SRESREcon21Andrea Spadaccini
    "Don't Follow Leaders" or "All Models Are Wrong (and So Am I)"SREcon21Niall Murphy
    Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission ModelUSENIX Security '21Bingyu Shen, Lili Wei, Chengcheng Xiang, Yudong Wu, Mingyao Shen, Yuanyuan Zhou, Xinxin Jin
    EVMPatch: Timely and Automated Patching of Ethereum Smart ContractsUSENIX Security '21Michael Rodler, Wenting Li, Ghassan O. Karame, Lucas Davi
    DOLMA: Securing Speculation with the Principle of Transient Non-ObservabilityUSENIX Security '21Kevin Loughlin, Ian Neal, Jiacheng Ma, Elisa Tsai, Ofir Weisse, Satish Narayanasamy, Baris Kasikci
    Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized ApplicationsUSENIX Security '21Liya Su, Xinyue Shen, Xiangyu Du, Xiaojing Liao, XiaoFeng Wang, Luyi Xing, Baoxu Liu
    PTAuth: Temporal Memory Safety via Robust Points-to AuthenticationUSENIX Security '21Reza Mirzazade Farkhani, Mansour Ahmadi, Long Lu
    VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interfaceUSENIX Security '21Zitai Chen, Georgios Vasilakis, Kit Murdock, Edward Dean, David Oswald, Flavio D. Garcia
    Identifying Harmful Media in End-to-End Encrypted Communication: Efficient Private Membership ComputationUSENIX Security '21Anunay Kulshrestha, Jonathan Mayer
    "Shhh...be quiet!" Reducing the Unwanted Interruptions of Notification Permission Prompts on ChromeUSENIX Security '21Igor Bilogrevic, Balazs Engedy, Judson L. Porter III, Nina Taft, Kamila Hasanbega, Andrew Paseltiner, Hwi Kyoung Lee, Edward Jung, Meggyn Watkins, PJ McLachlan, Jason James
    Smart Contract Vulnerabilities: Vulnerable Does Not Imply ExploitedUSENIX Security '21Daniel Perez, Benjamin Livshits

Pages